I love IP Tables....
Michael Klinosky
mpk2 at enter.net
Sat May 26 13:17:22 UTC 2007
Even tho /some/ of the technical stuff eludes me, I've tried to follow
this thread.
I set up ssh for myself (I own the machines); I haven't yet actually
made a connection (probably will this weekend).
I'd like to know what threats exits for ssh - are there webpages that
discuss this? I *thought* that using an arbitrary port and putting
'AllowUsers ...' into sshd_config would handle these things (along with
a password other than 'abcd' :) ).
More information about the fedora-list
mailing list